Collaboration with e-waste think tank aimed at educating organisations on electronic equipment disposal.
Read MoreEstablishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is that assurance processes consume resources, slow activities and can lead to additional work—all to achieve goals they may not understand. ISACA’s new COBIT 5 for Assurance bridges the gap by translating assurance activities into a common language that is meaningful to business and technology partners and ties...
Read MoreMcAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing critical visibility to risk management. The suites are the first to include McAfee Deep Defender, a rootkit protection based on hardware-enhanced security jointly developed by Intel and McAfee, dynamic whitelisting, risk...
Read MoreMcAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software) is now fully integrated with the McAfee®ePolicy Orchestrator® (McAfee ePO™) platform. With McAfee EMM software, comprehensive security, policy, and management capabilities are extended to mobile devices. McAfee ePO software enables enterprises to protect their data on company-issued and employee-owned devices (smartphones, tablets, laptops, and desktop computers) through a single,...
Read MoreHardware purchases drive increase in spending; backup/recovery software and tablets show strong growth.
Read MoreAccording to a new whitepaper revealed by independent datacentre consultancy, Glasshouse Technologies, Bring Your Own Device (BYOD) initiatives may not have met the expectations of employees, businesses or CIOs.
Read More